• Title/Summary/Keyword: Detection Systems

Search Result 6,016, Processing Time 0.035 seconds

Fault Detection by Using an Adaptive Observer

  • Inoue, A.;Deng, M.;Yoshinaga, S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.710-713
    • /
    • 2005
  • In this paper, a design method to detect faults in plants with uncertainties is proposed. When a plant has faults, the plant will be corrupted by an unknown fault signal. In addition, the plant also includes uncertainties, such as disturbances and plant parameter deviations. In this case, the proposed method estimates the fault signal by using an adaptive observer. Numerical examples are given to demonstrate the validity of the proposed method.

  • PDF

Collision prediction and detection in a dynamic environment (동적 환경하에서의 충돌 예측 및 감지)

  • 한인환;양우석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1992.10a
    • /
    • pp.309-314
    • /
    • 1992
  • Many dynamic mechanical systems, such as parts-feeders, walking machines, and percussive power tools, are described by equations of motion which are discontinuous. The discontinuities result from kinematic constraint changes which are difficult to foresee, especially in presence of impact. A simulation algorithm for these types of systems must be able to algorithmically predict and detect the kinematic constraint changes without any prior knowledge of the system's motion. This paper presents a rule-based approach to the prediction and detection of kinematic constraint changes between bodies with arc and line boundaries. The developed algorithm's ability to accurately and automatically detect the unpredicted changes of kinematic constraints is demonstrated with a numerical example.

  • PDF

A Detection Method for Network Intrusion using the NFR (NFR을 이용한 네트워크 침입 탐지)

  • 최선철;차현철
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2001.05a
    • /
    • pp.261-267
    • /
    • 2001
  • In this paper, we have illustrated implementations and there results of network attacks and detections. We consider two attacks, smurf attach and network mapping attack, which are one of the typical intrusions using the ICMP The NFR/sup TM/ is used to capture all of our interesting packets within the network traffic. We implement the smurf and network mapping attacks with the UNIX raw socket, and build the NFR's backend for it's detection. The N-Code programming is used to build the backend. The implementing results show the possibility of preventing illegal intruding to network systems.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

Dwell Time Optimization of Alert-Confirm Detection for Active Phased Array Radars

  • Kim, Eun Hee;Park, JoonYong
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.2
    • /
    • pp.107-114
    • /
    • 2019
  • Alert-confirm detection is a highly efficient method to improve phased array radar search performance. It comprises sequential detection in two steps: alert detection, in which a target is detected at a low detection threshold, and confirm detection, which is triggered by alert detection with a longer dwell time to minimize false alarms. This paper provides a design method for applying the alert-confirm detection to multifunctional radars. We find optimum dwell times and false alarm probabilities for each alert detection and confirm detection under the dual constraints of total false alarm probability and maximum allowable dwell time per position. These optimum values are expressed as a function of the mean new target appearance rate. The proposed alert-confirm detection increases the maximum detection range even with a shorter frame time than that of uniform scanning.

A Study of Security Rule Management for Misuse Intrusion Detection Systems using Mobile Agent (오용 침입탐지 시스템에서 모바일 에이전트를 이용한 보안규칙 관리에 관한 연구)

  • Kim, Tae-Kyung;Lee, Dong-Young;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.5
    • /
    • pp.525-532
    • /
    • 2003
  • This paper describes intrusion detection rule management using mobile agents. Intrusion detection can be divided into anomaly detection and misuse detection. Misuse detection is best suited for reliably detecting known use patterns. Misuse detection systems can detect many or all known attack patterns, but they are of little use for as yet unknown attack methods. Therefore, the introduction of mobile agents to provide computational security by constantly moving around the Internet and propagating rules is presented as a solution to misuse detection. This work presents a new approach for detecting intrusions, in which mobile agent mechanisms are used for security rules propagation. To evaluate the proposed approach, we compared the workload data between a rules propagation method using a mobile agent and a conventional method. Also, we simulated a rules management using NS-2 (Network Simulator) with respect to time.

Multiple Plane Area Detection Using Self Organizing Map (자기 조직화 지도를 이용한 다중 평면영역 검출)

  • Kim, Jeong-Hyun;Teng, Zhu;Kang, Dong-Joong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.22-30
    • /
    • 2011
  • Plane detection is very important information for mission-critical of robot in 3D environment. A representative method of plane detection is Hough-transformation. Hough-transformation is robust to noise and makes the accurate plane detection possible. But it demands excessive memory and takes too much processing time. Iterative randomized Hough-transformation has been proposed to overcome these shortcomings. This method doesn't vote all data. It votes only one value of the randomly selected data into the Hough parameter space. This value calculated the value of the parameter of the shape that we want to extract. In Hough parameters space, it is possible to detect accurate plane through detection of repetitive maximum value. A common problem in these methods is that it requires too much computational cost and large number of memory space to find the distribution of mixed multiple planes in parameter space. In this paper, we detect multiple planes only via data sampling using Self Organizing Map method. It does not use conventional methods that include transforming to Hough parameter space, voting and repetitive plane extraction. And it improves the reliability of plane detection through division area searching and planarity evaluation. The proposed method is more accurate and faster than the conventional methods which is demonstrated the experiments in various conditions.

Unified Detection and Tracking of Humans Using Gaussian Particle Swarm Optimization (가우시안 입자 군집 최적화를 이용한 사람의 통합된 검출 및 추적)

  • An, Sung-Tae;Kim, Jeong-Jung;Lee, Ju-Jang
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.4
    • /
    • pp.353-358
    • /
    • 2012
  • Human detection is a challenging task in many fields because it is difficult to detect humans due to their variable appearance and posture. Furthermore, it is also hard to track the detected human because of their dynamic and unpredictable behavior. The evaluation speed of method is also important as well as its accuracy. In this paper, we propose unified detection and tracking method for humans using Gaussian-PSO (Gaussian Particle Swarm Optimization) with the HOG (Histograms of Oriented Gradients) features to achieve a fast and accurate performance. Keeping the robustness of HOG features on human detection, we raise the process speed in detection and tracking so that it can be used for real-time applications. These advantages are given by a simple process which needs just one linear-SVM classifier with HOG features and Gaussian-PSO procedure for the both of detection and tracking.

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

Development of a Vision Sensor-based Vehicle Detection System (스테레오 비전센서를 이용한 선행차량 감지 시스템의 개발)

  • Hwang, Jun-Yeon;Hong, Dae-Gun;Huh, Kun-Soo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.16 no.6
    • /
    • pp.134-140
    • /
    • 2008
  • Preceding vehicle detection is a crucial issue for driver assistance system as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision. The vision-based preceded vehicle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an preceded vehicle detection system is developed using stereo vision sensors. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the preceded vehicles including a leading vehicle. Then, the position parameters of the preceded vehicles or leading vehicles can be obtained. The proposed preceded vehicle detection system is implemented on a passenger car and its performances is verified experimentally.